Ionut Ilascu

37 Followers
6 Following
19 Posts
Security news reporter @BleepingComputer
websitehttps://www.bleepingcomputer.com/author/ionut-ilascu/
Twittertwitter.com/Ionut_Ilascu

Google says that it removed the ads and took action against associate accounts.

Company added that it sees bad actors working on a larger scale and with more sophistication to evade detection.

Good chance we'll see more of this

https://www.bleepingcomputer.com/news/security/google-ads-push-malicious-cpu-z-app-from-fake-windows-news-site/

Google ads push malicious CPU-Z app from fake Windows news site

A threat actor has been abusing Google Ads to distribute a trojanized version of the CPU-Z tool to deliver the Redline info-stealing malware.

BleepingComputer
ChatGPT down after major outage impacting OpenAI systems

OpenAI's AI-powered ChatGPT large language model-based chatbot is down because of a major ongoing outage that also took down the company's Application Programming Interface (API).

BleepingComputer

Incredible what DNS data can help uncover.

Short link service for crims registered up to 75, 000 domains since April 2023.

Operation active for at least 4 years helped deliver phishing, scams, and malware.

In one day, they registered close to 800 domains, daily average since May is 43 domains.

#ProlificPuma

https://www.bleepingcomputer.com/news/security/massive-cybercrime-url-shortening-service-uncovered-via-dns-data/

Massive cybercrime URL shortening service uncovered via DNS data

A threat actor that security researchers call Prolific Puma has been providing link shortening services to cybercriminals for at least four years while keeping a sufficiently low profile to operate undetected.

BleepingComputer

Exploit code is publicly available for CVE-2023-20198. a maximum severity vulnerability in Cisco IOS XE that allows an attacker to bypass authentication and to create a new user with level 15 privileges.

Cisco IOS XE devices at many telecommunications and internet service providers have been hacked and the threat actor has been running commands for reconnaissance purposes.

https://www.bleepingcomputer.com/news/security/exploit-released-for-critical-cisco-ios-xe-flaw-many-hosts-still-hacked/

Exploit released for critical Cisco IOS XE flaw, many hosts still hacked

Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as a zero-day to hack tens of thousands of devices.

BleepingComputer

Hunting for traces of an Octo Tempest intrusion is difficult because the hackers combines advanced social engineering with living-off-the-land tools and techniques.

Behind the attacks are technically adept individuals and hands-on-keyboard operators.

https://www.bleepingcomputer.com/news/security/microsoft-octo-tempest-is-one-of-the-most-dangerous-financial-hacking-groups/

Microsoft: Octo Tempest is one of the most dangerous financial hacking groups

Microsoft has published a detailed profile of a native English-speaking threat actor with advanced social engineering capabilities it tracks as Octo Tempest, aka Scattered Spider, that targets companies in data extortion and ransomware attacks.

BleepingComputer

Before you head out for the weekend, read today's Metacurity for the top infosec developments you should know.

Lead items via @tila @serghei @SuzanneSmalley @jgreig @chrismvasq @mehtology, others

https://metacurity.substack.com/p/hackers-claim-six-terabyte-data-theft

Hackers Claim Six Terabyte Data Theft From MGM-Caesars, Say They Still Have MGM Access

Manchester cops hacked, Google to pay $93 million to settle CA location data suit, The Weather Network hit by attack, Iran threat group has targeted thousands of orgs, CA passes Delete Act, much more

Metacurity

CISA shares detection methods and TTPs after hackers breached a critical infrastructure org in the U.S. by exploiting CVE-2023-3519, the most severe (9.8/10) recently disclosed remote code execution bug in NetScaler ADC & Gateway.

The vuln was leveraged as an 0day in June.

The ShadowServer Foundation says there are ~15,000 NetScaler ADC and Gateway servers exposed online vulnerable to CVE-2023-3519.

https://www.bleepingcomputer.com/news/security/cisa-citrix-rce-bug-exploited-to-breach-critical-infrastructure-org/

CISA: Citrix RCE bug exploited to breach critical infrastructure org

Threat actors have breached the network of a U.S. organization in the critical infrastructure sector after exploiting a zero-day RCE vulnerability currently identified as CVE-2023-3519, a critical-severity issue in NetScaler ADC and Gateway that Citrix patched this week.

BleepingComputer

Technical details are now available for a recently patched high-severity vuln in Citrix ADC and Gateway > CVE-2023-3467

Researchers at Resillion, credited for the find, explain how the issue could be exploited to achieve root-level privileges.

https://www.resillion.com/escalating-privileges-in-citrix-adc/

Escalating privileges in Citrix ADC - Resillion

Part of Citrix’s solution line-up, Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing solution. In March 2023, two of Resillion’s ethical hackers (Jorren Geurts & Wouter Rijkbost) identified a vulnerability within Citrix ADC that allowed anyone with access to the management interface to escalate their privileges up to root. Essentially giving […]

Resillion
LOL, I made a class at work that is about 8.5 hours of videos straight, and titled it a "2 day class", but now everyone is super confused and sending me messages because naturally to me no sane person would try to watch over 8 hours of videos in one day with no breaks or lunch and actually learn material, but I guess corporate America has trained them well. Joke's on me.
Top 10 tactics and techniques that pentesters at Positive Technologies used successfully last year